References

  1. Prince B. Data Breach Costs Rise, Healthcare Industry Hardest Hit. SecurityWeek. 2015 May. Accessed October 16, 2015.
  2. IBM, Ponemon Institute. 2015 Cost of Data Breach Study: Global Analysis. Accessed October 16, 2015.
  3. HHS. Guidance Regarding Methods for De-identification. Protected Health Information. Accessed October 16, 2015.
  4. EMC2, RSA. Cybercrime and the Healthcare Industry. 2013:1,3. Accessed October 16, 2015.
  5. Weldon D. The cyber insurance cleanup crew: A look inside a data breach response team. FierceCIO. 2015 Feb. Accessed October 16, 2015.
  6. HHS. The Privacy Rule.Accessed October 16, 2015.
  7. HHS. The Security Rule. Accessed October 16, 2015.
  8. HHS. Breach Notification Rule. Accessed October 16, 2015.
  9. National Conference of State Legislatures. Security Breach Notification Laws. Accessed October 16, 2015.
  10. Davis Wright Tremaine LLP. Summary of U.S. State Data Breach Notification Statutes. Accessed October 16, 2015.
  11. HHS. How to File a Complaint. Accessed October 16, 2015.
  12. Ponemon Institute. Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data. 2015 May. Accessed October 16, 2015.
  13. HealthIT.gov. Security Risk Assessment. Accessed October 16, 2015.
  14. PCI Security Standards Council. PCI DSS Small Merchants. Accessed October 16, 2015.
  15. HealthIT.gov. Privacy and Security. Accessed October 16, 2015.
  16. United States Computer Emergency Readiness Team. Accessed October 16, 2015.
  17. National Institute of Standards and Technology. Computer Security Resource Center. Accessed October 16, 2015.
  18. National Institute of Standards and Technology. Computer Security Resource Center. Special Publications (800 Series). Accessed October 16, 2015.
  19. National Institute of Standards and Technology. Computer Security Resource Center. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Accessed October 16, 2015.
  20. American Dental Association. The ADA Complete HIPAA Compliance Kit. Accessed October 16, 2015.
  21. HITRUST Alliance. Common Security Framework. Accessed October 16, 2015.
  22. Secunia. Personal Software Inspector. Accessed October 16, 2015.
  23. Metaquark. AppFresh for Mac. Accessed October 16, 2015.
  24. Rubenking, NJ. The Best Antivirus for 2015. PCMag. 2015 Jun. Accessed October 16, 2015.
  25. Eddy M. 11 Antivirus Apps for the Mac. PCMag. 2015 Feb. Accessed October 16, 2015.
  26. Jackson Higgins, K. Healthcare Data Breaches From Cyberattacks, Criminals Eclipse Employee Error For The First Time. Dark Reading. 2015 May. Accessed October 16, 2015.
  27. HHS Office of Civil Rights. Breaches Affecting 500 or More Individuals. Accessed October 16, 2015.
  28. Bitglass. The 2014 Bitglass Healthcare Breach Report. 2014 Nov:3. Accessed October 16, 2015.
  29. Pruitt DK. HHS reports a Missouri dental practice’s data breach. Dentistry IQ. 2010 Feb. Accessed October 16, 2015.
  30. Bird J. Boston teaching hospital fined $1.5M for ePHI breach. FierceHealthIT. 2012 Sept. Accessed October 16, 2015.
  31. Cluley G. Ex-MI5 boss loses laptop at Heathrow airport. Naked Security. 2012 Jun Accessed October 16, 2015.
  32. Scarfone K. The fundamentals of FDE: Comparing the top full disk encryption products. Search Security. 2014 Dec. Accessed October 16, 2015.
  33. Fleishman G. How to encrypt your Mac with FileVault 2, and why you absolutely should. Macworld. 2015 Feb. Accessed October 16, 2015.
  34. Paul I. A beginner’s guide to BitLocker, Windows’ built-in encryption tool. PC World 2014 May. Accessed October 16, 2015.
  35. Top Ten Reviews. The Best Encryption Software of 2015. Accessed October 16, 2015.
  36. Top Ten Reviews. The Best Email Encryption Software of 2015. Accessed October 16, 2015.
  37. National Institute of Standards and Technology. Guidelines for Media Sanitization. SP 800-88 rev. 1. 2014 Dec. Accessed October 16, 2015.
  38. BBC News. Brighton hospital fined record £325,000 over data theft. 2012 June. Accessed October 16, 2015.
  39. Fonseca B. Shuttle Columbia’s hard drive data recovered from crash site. Computerworld. 2008 May. Accessed October 16, 2015.
  40. Apple Support. Find My iPhone Activation Lock. Accessed October 16, 2015.
  41. Zorabedian J. Android Lollipop 5.1 brings promised anti-theft "kill switch." Naked Security. 2015 Mar. Accessed October 16, 2015.
  42. Millman R. 97% of malicious mobile malware targets Android. SC Magazine. 2015 June. Accessed October 16, 2015.
  43. AV-TEST. The best antivirus software for Android. Accessed October 16, 2015.
  44. Krebs B. Online Thieves Take $205,000 Bite Out of Missouri Dental Practice. Krebs on Security. 2010 Mar. Accessed October 16, 2015.
  45. FBI Internet Crime Complaint Center. Business E-mail Compromise. 2015 Jan. Accessed October 16, 2015.
  46. FBI Internet Crime Complaint Center, Business Email Compromise (Update). 2015 Aug. Accessed October 16, 2015.
  47. Symantec. Internet Security Threat Report 20. 2015 Apr:93-96. Accessed October 16, 2015.
  48. AV-TEST. Antivirus Software & AntiMalware Reviews. Accessed October 16, 2015.
  49. Chickowski E. 10 Free Or Low-Cost Network Discovery And Mapping Tools. Dark Reading. 2014 Jan. Accessed October 16, 2015.
  50. Aurnou S. What Are Honeypots (and How Can They Protect Your Network)? The Security Advocate. 2013 Oct. Accessed October 16, 2015.
  51. Lindros K, Tittel E. How to Choose the Best Vulnerability Scanning Tool for Your Business. CIO. 2014 Sept. Accessed October 16, 2015.

Additional Resources

  • No Additional Resources Available